Series-6 (May-June 2019)May-June 2019 Issue Statistics
Series-1 Series-2 Series-3 Series-4 Series-5 Series-6
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: The plan of studies to collective architectonics of Radio Access network (F-RAN) is agitated out by baseband processing unit (BBU) that is affiliated to added limited radioactive by agency of links. Bend processing is instead enabled by bounded caching of accepted agreeable. Focusing on the architectonics of the supply appearance for an approximate strategy, a typical superposition coding access is proposed that is based on the amalgam use of the links in both hard-transfer and soft-transfer modes. Adaptable bend networks accommodate accretion and caching capabilities at the bend of cellular networks. In this survey, accomplish an all-embracing assay on the advanced assay efforts on adaptable bend networks. In addition, the optimal user-centric array is studied........
Keywords: Cloud radio access network, fog network, caching, pre-coding. Pre-fetching, mobility prediction , vehicular networks, D2D, SDN, NFV and content delivery.
[1]. A. Checko, H. L. Christiansen, Y. Yan, L. Scolari, G. Kardaras, M. S. Berger and L. Dittmann, "Cloud RAN for adaptable networks – a technology overview," IEEE Comm. Surveys Tutorials, vol. 17, no. 1, pp. 405-426, First Quart. 2015.
[2]. O. Simeone, A. Maeder, M. Peng, O. Sahin and W. Yu, "Cloud radio admission network: Virtualizing wireless admission for close amalgamate systems," arXiv:1512.07743, Dec. 2015.
[3]. M. Peng, S. Yan, K. Zhang and C. Wang, "Fog accretion based radio admission networks: Issues and Challenges," arXiv:1506.04233, Jun. 2015.
[4]. S. Bi, R. Zhang, Z. Ding and S. Cui, "Wireless communications in the era of big data," arXiv:1508.06369, Aug. 2015.
[5]. China Mobile, "Next bearing fronhtaul interface," White Paper, Oct 2015.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Dynamic Analysis of a Window-Based Malware Using Automated sandboxing |
Country | : | Nigeria |
Authors | : | Dr. Chandrashekhar UPPIN |
: | 10.9790/0661-2103061222 |
Abstract: Malwares are one of the most dangerous security threats in today's world of fast growing technology. Now, it is not impossible to remotely lock down a system's files for ransoms even when it is located overseas. This threat was accelerated when the world was introduced to cryptocurrency (for e.g., Bitcoins). It allowed the attackers to hide their tracks more efficiently. From a simple idea of testing the efficiency of a computer system to the most critical and sophisticated cyber-attack, malwares has evolved over the years and appeared time to time. Even with.........
Keywords:Malwares, Machine learning, Deep learning, LockerGoga, Cryptocurrency, Static and dynamic analyses.
[1]. Chakkaravarthy, S. S., Sangeetha, D., &Vaidehi, V. (2019). A Survey on malware analysis and mitigation techniques. Computer Science Review, 32, 1-23.
[2]. Kapat, S. K., &Tripathy, S. N. (2019). Malware Architectural View with Performance Analysis in Network at Its Activation State. In Cognitive Informatics and Soft Computing (pp. 207-216). Springer, Singapore.
[3]. Lin, C. H., Pao, H. K., & Liao, J. W. (2018). Efficient dynamic malware analysis using virtual time control mechanics. Computers & Security, 73, 359-373.
[4]. Darki, A., Chuang, C. Y., Faloutsos, M., Qian, Z., & Yin, H. (2018, March). RARE: A Systematic Augmented Router Emulation for Malware Analysis. In International Conference on Passive and Active Network Measurement (pp. 60-72). Springer, Cham.
[5]. Yu, B., Fang, Y., Yang, Q., Tang, Y., & Liu, L. (2018). A survey of malware behavior description and analysis. Frontiers of Information Technology & Electronic Engineering, 19(5), 583-603..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Study on the Performance of Classification Algorithms for Data Mining |
Country | : | Bangladesh |
Authors | : | Md. Humayun Kabir |
: | 10.9790/0661-2103062330 |
Abstract: This paper explores briefly some classification algorithms and their application in data mining to discover data mining models by analyzing a training data set. Various classifier models e.g., Naïve Bayes classifier, two functional models- Multilayer perceptron and SMO model, three decision tree models- ID3, J48 and Random Forests are generated from the training data set. A decision tree model represents the decision making knowledge embedded within a database as classification hierarchy to determine the class label of a particular data record. A car evaluation database is used in investigating the functioning of the various classifiers. The research work........
Keywords:Classifier, Training data set, Decision making knowledge, Data mining model, Class label.
[1]. L. Zhang, Y. Chen, Y. Liang and N. Li, Application of Data Mining Classification Algorithms in Customer Membership Card Classification Model, International Conference on Information Management, Innovation Management and Industrial Engineering 2008. IEEE Computer Society.
[2]. J. R. Quinlan, Induction of Decision Trees. Machine Learning. 1(1), March 1986, 81-106.
[3]. J. R. Quinlan and R. L. Rivest, Inferring Decision Trees Using the Minimum Description Length Principle, Information and Computation, 80(3), 1989, 227-248.
[4]. J. R. Quinlan, Improved Use of Continuous Attributes in C4.5, Journal of Artificial Intelligence Research, 4(1), 1996, 77-90.
[5]. L. Qin and W. Yongquan, Improved ID3 Algorithm Using Ontology in Computer Forensics, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), 2010, 494-497.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Scrum Methodology Intended for Meetings |
Country | : | India |
Authors | : | Dhanamma Jagli || Jehan Vapiwala |
: | 10.9790/0661-2103063133 |
Abstract: The agile methods, such as Scrum and Extreme Programming (XP), have been a topic of much discussion in the software community over the last few years. While these have gained importance in the industry because of their approach on the issues of human agility and return on investment, usually within a context of small-tomedium size projects with significant requirements volatility, the ones who do not support these methods have expressed serious concerns about the effectiveness of the methods. Scrum attempts to build the work in short iterations where each iteration consists of short time boxes.
[1]. Scrum: The Art of Doing Twice the Work in Half the Time by Jeff Sutherland (Book).
[2]. Scrum Guides: https://www.scrumguides.org/.
[3]. Agile Scrum Methodology:https://www.softwaretestinghelp.com/agile-scrum-methodology-for-development-and-testing/.
[4]. Scrum and Agile:https://www.mountaingoatsoftware.com/agile/scrum.
[5]. Definition of Scrum:https://searchsoftwarequality.techtarget.com/definition/Scrum.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Cloud computing as a service (aaS) model is considered as one of the most ubiquitous and accomplished paradigms in Information Technology (IT) in the 21st century, it is economic, financial and technological invention in business organization that revolutionized how IT resources and services are utilized and delivered as a service framework. The introduction of cloud computing as a service (aaS) framework in cloud computing eliminate the need for organization to locally manage and maintain Information System (IS) infrastructure as well as including the cost of buying expensive hardware and software. According to the available literature reviewed in this paper, the paper has studied the evolution of as-a-service (aaS) model framework and explore the new members to as a service (aaS) model beyond the traditional cloud service that will help in proposing an approach for organization that is trying to implement, migrate and adopt cloud computing as a service.
Keywords: Cloud computing, as-a-service (aaS) model
[1]. Agrawal, G. (2019). A survey on the "vision of cloud computing - its referential architecture, characteristics and applications". Journal of current science, 20(1).
[2]. AL_Jabri, I. M., Eid, M. I., & Sohail, M. S. (2018). A group decision-making method for selecting cloud computing service model. International journal of advanced computer science and apllication (IJACSA), 9(1), 449-456.
[3]. Cai, W., Huang, C., Chen, K., & Leung, V. C. (2016). Gaming, The Future of Cloud. Proceedings of the IEEE, 104(4), 687-691. doi:https://www.researchgate.net/publication/298799626
[4]. Chang, V., Walters, R. J., & Wills, G. B. (2012). Business integration as a Service. International Journal of Cloud Application and Computing, 2(1), 1-20.
[5]. Chen, Q., Hsu, M., & Zeller, H. (2011). Experience in continuous analtics as a Service (CaaaS)..
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Blockchain is being named as the fifth tricky progression in handling. In most clear words, it is a scattered record of records that is constant and irrefutable. Since its methodology in 2008, blockchain as a thought has been used in various ways. The greatest impact or application is seen as an extensive number of cryptographic types of cash that have bounced up. Regardless, with time, it has ended up being clear that blockchain as an advancement is most likely going to have an impact significantly more broad than basically the computerized cash region and much more remote than direct appropriated record accumulating. Present day Blockchain utilization need............
Keywords: Blockchain, Cryptocurrency, Distributed Ledger, Bitcoin, Litecoin, Ethereum
[1]. N.Anderson, "Blockchain Technology A game-changer in accounting?," unpublished.
[2]. Admin. (2015, Nov 30). [Online]. Available: https://symbiont.io/uncategorized/distributed-ledgers-vs-centralized-databases/
[3]. P.Stafford. (2015, Jul 14). [Online]. Available: https://www.ft.com/content/454be1c8-2577-11e5-9c4e-a775d2b173ca
[4]. A.Lewis. (2017, Feb 20). [Online]. Available: https://bitsonblocks.net/2017/02/20/whats-the-difference-between-a-distributedledger-
and-a-blockchain/
[5]. Distributed Ledgers, Internet: http://www.investopedia.com/terms/d/distributed ledgers.asp [Mar.01,2017]..
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In this study, we performed a geomatic analysis of malaria's epidemiology in Para, Brazil (2003– 2011), and compared the incidence of malaria to socioeconomic and climate variables. Our results indicate that malaria was mainly observed in three clusters, with higher incidences in Marajó Island, Tucuruí and Jacareacanga, which had a water deficit of 30–120 mm and an Human Development Index of <0.65m. In addition, malaria requires appropriate weather conditions for transmission. These findings may be used to help support decision making regarding public health and malaria control measures in the state of Para, Amazon........
Keywords: Malaria, Geomatics, Human Development Index, Water deficits
[1]. BARBIER, F. A., SAWYER, D. O., 2007. Heterogeneidade da prevalência de malária em garimpos do norte de Mato Grosso,
Brasil. In Cadernos de Saúde Pública 23, 2878-2886.
[2]. BRUCE-CHWATT, L. J., 1988. History of malaria from prehistory to eradication. In: Wernsdorfer, W. H., McGregor I.
(Eds), Malaria: Principles and Practice of Malariology. Volume 1. Churchill Livingstone, Edinburgh, p. 127.
[3]. BARCELLOS, C., BASTOS, F. I., 1996. Geoprocessamento, ambiente e saúde: uma união possível? Caderno de Saúde Pública 12,
389-397.
[4]. BOUSQUAT, A. E. M., 2000. Para a Incorporação do Espaço na Saúde. Tese de doutorado. Faculdade de Medicina da USP, São
Paulo - SP.
[5]. BRAZ, M. R.; DUARTE, E. C.; TAUIL, P. L. Caracterização das epidemias de malária nos municípios da Amazônia Brasileira em
2010. Cad. Saúde Pública, Rio de Janeiro, 29(5):935-944, maio, 2013..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study on the Fault Issues in Networking |
Country | : | India |
Authors | : | Dr.Surender Singh |
: | 10.9790/0661-2103065254 |
Abstract: The computer network is made out of a computer set in addition to communication offices, that is, the utilization of different methods for communication, the geological scattering of the computer together to accomplish common communication and sharing programming, equipment and data resources and different systems. The computer network as indicated by its computer dissemination range is generally isolated into neighborhood and wide zone network. LAN inclusion of the topographical reach is little, as a rule in the quantity of meters to several kilometers. Wide inclusion of the topographical territory, for example, grounds, among urban communities, and even the world. The advancement of computer networks prompts different types of association between networks. The utilization of a bound together protocol to accomplish the interconnection of various networks, so the Web can without much of a stretch is expanded. The current paper highlights the fault issues in networking.
Keywords: Data, Networking, Fault
[1]. Vougioukas, S., Roumeliotis, M.: A System for Basic-Level Network Fault Management. In: Proceedings of International Conference on Trends in Communications (2016)
[2]. Roberts, A., Gorman, A.: Short Message Service for Outpatient Data Collection. British Journal of Anaesthesia (2018)
[3]. Salkind, N.: Reliability Theory. Encyclopedia of Measurement and Statistics (2016)
[4]. Yu, W., Tagle, P.: Development of an Over-the-Top Network Protocol for Pervasive, Secure and Reliable Data Transmission. In: 2010 International Conference on Computer and Software Modeling, IACSIT, pp. 1–7 (2017)
[5]. Zahary, A., Ayesh, A.: A Comparative Study for Reactive and Proactive Routing Protocols in Mobile Ad hoc Networks. Journal of Intelligent Computing 1, 20–29 (2015).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Water moving to the dam downstream makes significant levels of dynamic vitality. Ventured spillways
are among the best spillways in diminishing the dynamic vitality of the stream moving towards the downstream.
The geometry of the means in ventured spillways can influence the decrease of motor vitality of the stream
moving to the downstream. As of late pooled designs have been more pervasive than smooth ones since this sort
of spillways could have more dispersal. Accordingly, in this examination the impact of various number of
pooled steps and release on stream design particularly vitality dissemination was researched. The VOF strategy
was utilized to mimic the stream surface and the k-ε (RNG) choppiness model was utilized for stream
disturbance recreation. Looking....
Keywords: Three-Dimensional Simulation; Stepped Spillway; Energy Dissipation; Flow Patterns; Turbulent Kinetic Energy
[1]. Chanson, Hubert. "Hydraulic design of stepped spillways and downstream energy dissipators." Dam Engineering 11, no. 4 (2001):
205-242.
[2]. Sorensen, Robert M. "Stepped spillway hydraulic model investigation." Journal of Hydraulic Engineering 111, no. 12 (1985): 1461-
1472.
[3]. Christodoulou, George C. "Energy dissipation on stepped spillways." Journal of Hydraulic Engineering 119, no. 5 (1993): 644-650.
[4]. Boes, Robert M., and Willi H. Hager. "Hydraulic design of stepped spillways." Journal of Hydraulic Engineering 129, no. 9 (2003):
671-679.
[5]. Kisi, Ozgur, M. Emin Emiroglu, and Ahmet Baylar. "Flow regime prediction in stepped channels using neural computing
technique." International Journal of Science & Technology 3, no. 1 (2008): 109-121.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Achievement of a task is one of the best and most significant objectives and worries of troughs and all
individuals engaged with an undertaking. The reason for state structural building ventures achievement is to
diminish cost and time just as expanding the quality and fulfillment of society and government as the fundamental
clients. Numerous variables impact structural designing activities achievement and distinguishing them
exceptionally help the fruitful usage of structural building ventures. As one of the most significant factor, it tends to
be alluded to extend supervisory crew. The fundamental reason for the current investigation is to locate the viable
connection between supervisory crew arrangement and structural building ventures achievement. To this end,
library and field techniques......
Keywords: Management Team; Management Team Formation; Success of Civil Engineering Projects; Ranking.
[1]. Safari, M. (2011). Investigating successful civil engineering projects barriers. MA thesis, Islamic Azad University, Bonab branch
[2]. Arbabi, H., Sabihe, M. and Nazari, V. (2009). Presenting a conceptual model of key factors of program success, the 5th international
conference of project management, Tehran, Aryana research group[3]. Ameri, A. (2012). Beneficiary management in civil engineering projects, the 8th international conference of project management,
Tehran, Kian management research center
[4]. Tavakoli, A. (2007). What we should with uncompleted civil engineering projects? Research paper, economic research letter magazine,
no. 26, 15-42.
[5]. DQS, ISO Guid 73:2009. In iso31000, germany: dqs, 2009
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | LSB Based Digital Image Watermarking For Gray Scale Image |
Country | : | India |
Authors | : | Himanshu Bhusan Mohapatra || Saumendra Behera |
: | 10.9790/0661-2103067984 |
Abstract: In recent years, internet revolution resulted in an explosive growth in multimedia applications.
The rapid advancement of internet has made it easier to send the data/image accurate and faster to the
destination. Besides this, it is easier to modify and misuse the valuable information through hacking at the same
time. Digital watermarking is one of the proposed solutions for copyright protection of multimedia data. A
watermark is a form, image or text that is impressed onto paper, which provides evidence of its authenticity.
In this paper an invisible watermarking technique (least significant bit) and a visible watermarking technique is
implemented.......
Keywords - Watermarking, Least Significant Bit (LSB), JPEG (Joint Photographic Experts Group), Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR).
[1]. PreetiGupta,"Cryptographybaseddigitalimagewatermarkingalgorithmtoincreasesecurityofwatermarkdata",International Journal of
Scientific & Engineering Research, Volume 3, Issue 9 (September 2012) ISSN2229-5518
[2]. Manpreet Kaur, Sonika Jindal, Sunny Behal, "A Study of Digital Image Watermarking", IJREAS ,Volume 2, Issue 2 (Februry
2012)pp-126-136
[3]. B Surekha, Dr GN Swamy, "A Spatial Domain Public Image Watermarking", International Journal of Security and Its Applications
Vol. 5 No. 1, January,2011
[4]. Robert, L., and T. Shanmugapriya, "A Study on Digital Watermarking Techniques ", International Journal of Recent Trends in
Engineering, vol. 1, no. 2, pp. 223-225,2009.
[5]. H.Arafat Ali, "Qualitative Spatial Image Data Hiding for Secure Data Transmission", GVIP Journal,Volume 7,Issue 2 , pages 35-
37, 2, August2007